A framework for outsourcing of secure computation

TP Jakobsen, JB Nielsen, C Orlandi - Proceedings of the 6th edition of …, 2014 - dl.acm.org
We study the problem of how to efficiently outsource a sensitive computation on secret
inputs to a number of untrusted workers, under the assumption that at least one worker is …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Secure outsourced computation

J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of
theoretical cryptography. Since that time a number of papers have been published which …

[PDF][PDF] Secure outsourced computation in a multi-tenant cloud

S Kamara, M Raykova - IBM Workshop on Cryptography and Security in …, 2011 - cachin.com
We present a general-purpose protocol that enables a client to delegate the computation of
any function to a cluster of n machines in such a way that no adversary that corrupts at most …

Outsourcing secure two‐party computation as a black box

H Carter, B Mood, P Traynor… - Security and …, 2016 - Wiley Online Library
Secure multiparty computation (SMC) offers a technique to preserve functionality and data
privacy in mobile applications. Current protocols that make this costly cryptographic …

Secure computation on the web: Computing without simultaneous interaction

S Halevi, Y Lindell, B Pinkas - … in Cryptology–CRYPTO 2011: 31st Annual …, 2011 - Springer
Secure computation enables mutually suspicious parties to compute a joint function of their
private inputs while providing strong security guarantees. However, its use in practice seems …

Secure outsourced computation

N Smart - US Patent App. 12/827,247, 2012 - Google Patents
0001. This invention relates to cryptography, and in par ticular relates to a method and a
system that allows out Sourced multi-party computation to be performed in a secure way …

Practical delegation of computation using multiple servers

R Canetti, B Riva, GN Rothblum - … of the 18th ACM conference on …, 2011 - dl.acm.org
The current move to Cloud Computing raises the need for verifiable delegation of
computations, where a weak client delegates his computation to a powerful server, while …

Two-output secure computation with malicious adversaries

A Shelat, CH Shen - Advances in Cryptology–EUROCRYPT 2011: 30th …, 2011 - Springer
We present a method to compile Yao's two-player garbled circuit protocol into one that is
secure against malicious adversaries that relies on witness indistinguishability. Our …

Efficient secure outsourcing of large-scale quadratic programs

S Salinas, C Luo, W Liao, P Li - Proceedings of the 11th ACM on Asia …, 2016 - dl.acm.org
The massive amount of data that is being collected by today's society has the potential to
advance scientific knowledge and boost innovations. However, people often lack sufficient …